IEEE Technology and Society Magazine - December 2020 - 61

organizations all rely on computer systems every day.
Personal identification data, social security numbers,
credit card details or bank account information, and
many more sources of sensitive personal information
may easily be stolen if an individual with malicious
intent comes across them. Moreover, hackers are
becoming increasingly sophisticated, hacking tools are
widely available, and more and more smart devices are
connected to the Internet. Is the dreadful disaster just
one click away?
Luckily, citizens are not necessarily doomed to face
disaster, as the myriad of cybersecurity threats seems
to balance with plenty of " good guys " - IT specialists,
scientists, criminologists, companies, white-hat hackers, cyber militia, and many more individuals and organizations who work hard and try to be a step ahead of
the cyber threat actors [1], [2]. Recently, in order to protect people on yet another level, the cybersecurity
issues have also been addressed by legal regulations, the most significant of them being the
Regulation (EU) 2016/679 of the European Parliament and the Council of 27 April 2016 on
the protection of natural persons with
regard to the processing of personal
data and on the free movement of
such data, and repealing Directive
95/46/EC, or the General Data Protection Regulation (GDPR) [3].
One might suppose that both
the world of cybersecurity measures and policies such as the
GDPR go side by side. However, it
is not always that obvious. For
instance, intrusion detection
tools, which are often the means
of helping to achieve GDPR compliance as such, must be designed
in such a way to be GDPR-compliant
themselves. Thus, this paper deals
with the problem of intrusion detection tools being examined for being (or
rather: not being) GDPR-compliant. This
translates into the following challenge:
what qualities, properties and/or requirements must a stego/malware detection solution
satisfy in order to be GDPR-compliant? We start
here with an analysis of the legal basis and terms
imposed by GDPR. Then it identifies the requirements
that pose a particular challenge for the creators of
stego/malware detection systems in the context of
ensuring GDPR-compliance. Finally, we define a list of
recommendations to follow in order to ensure GDPR
compliance for stego/malware detection tools. We
argue that these recommendations should constitute
DECEMBER 2020

∕

the basis for policy formulation for several actors in the
" cyber ecosystem, " such as public authorities, national
CSIRTs, and private CERTs, as well as for law enforcement agencies and data protection bodies.

GDPR - Overview and the Legal Background
The General Data Protection Regulation (GDPR), is a
European Union's regulation that after being passed by
the European Parliament in 2016 came into force on
May 25, 2018 [4]. It is the toughest privacy and security
law in the world as it imposes obligations onto organizations anywhere, as long as they process data related to
people in the EU and EEA. The five key GDPR takeaways
are: penalties, consent, privacy by design, data breach
notification, and pseudonymization [4].
One of the pieces of the GDPR compliance puzzle are
information security tools, as they help protect consumer
data privacy. In order to be GDPR-compliant, numerous
organizations employ a myriad of cybersecurity measures in order to prevent breaches and attacks, and keep
the data they store safe, such as data discovery and classification tools, encryption and data masking solutions,
incident response, and case management framework and
malware/stegomalware detection tools. This paper discusses the last of the aforementioned measures. Malicious software (malware) is the term used to describe
one of the cybersecurity threats, i.e., programs that have
been designed to produce harmful and undesirable
effects, including viruses, worms, Trojan horses, and spyware [5]-[7]. One of the recent phenomena is the socalled stegomalware, which is the type of malware where
steganographic capabilities are employed to hide malicious components in order to evade detection and make
security analysis more challenging [8]. Undoubtedly,
when malware/stegomalware steals personal data without the data subject's consent, it breaks the GDPR and a
number of other laws and regulations.
Thus, malware/stegomalware detection tools should
be perceived only as a means of achieving GDPR. However, a kind of paradox arises: malware/stegomalware
detection tools rely on processing data themselves [9].
Unsurprisingly, the data in question is likely to comprise
personal data as well. Thus, it turns out that cybersecurity solutions that are an essential element of being
GPDR-compliant, are also directly addressed by the
GDPR. This means that according to the law, the tools
must be fully GDPR-compliant. Could one suppose they
are always compliant by default, though?
As indicated by [10], " EU data protection law stands
on a dual footing: on the one hand, it strives to facilitate
the free flow of personal data; on the other hand, it
makes the free flow of personal data subject to conformity with legal requirements that are derived from the
fundamental rights character of the right to privacy and

IEEE TECHNOLOGY AND SOCIETY MAGAZINE

61



IEEE Technology and Society Magazine - December 2020

Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - December 2020

Contents
IEEE Technology and Society Magazine - December 2020 - Cover1
IEEE Technology and Society Magazine - December 2020 - Cover2
IEEE Technology and Society Magazine - December 2020 - 1
IEEE Technology and Society Magazine - December 2020 - Contents
IEEE Technology and Society Magazine - December 2020 - 3
IEEE Technology and Society Magazine - December 2020 - 4
IEEE Technology and Society Magazine - December 2020 - 5
IEEE Technology and Society Magazine - December 2020 - 6
IEEE Technology and Society Magazine - December 2020 - 7
IEEE Technology and Society Magazine - December 2020 - 8
IEEE Technology and Society Magazine - December 2020 - 9
IEEE Technology and Society Magazine - December 2020 - 10
IEEE Technology and Society Magazine - December 2020 - 11
IEEE Technology and Society Magazine - December 2020 - 12
IEEE Technology and Society Magazine - December 2020 - 13
IEEE Technology and Society Magazine - December 2020 - 14
IEEE Technology and Society Magazine - December 2020 - 15
IEEE Technology and Society Magazine - December 2020 - 16
IEEE Technology and Society Magazine - December 2020 - 17
IEEE Technology and Society Magazine - December 2020 - 18
IEEE Technology and Society Magazine - December 2020 - 19
IEEE Technology and Society Magazine - December 2020 - 20
IEEE Technology and Society Magazine - December 2020 - 21
IEEE Technology and Society Magazine - December 2020 - 22
IEEE Technology and Society Magazine - December 2020 - 23
IEEE Technology and Society Magazine - December 2020 - 24
IEEE Technology and Society Magazine - December 2020 - 25
IEEE Technology and Society Magazine - December 2020 - 26
IEEE Technology and Society Magazine - December 2020 - 27
IEEE Technology and Society Magazine - December 2020 - 28
IEEE Technology and Society Magazine - December 2020 - 29
IEEE Technology and Society Magazine - December 2020 - 30
IEEE Technology and Society Magazine - December 2020 - 31
IEEE Technology and Society Magazine - December 2020 - 32
IEEE Technology and Society Magazine - December 2020 - 33
IEEE Technology and Society Magazine - December 2020 - 34
IEEE Technology and Society Magazine - December 2020 - 35
IEEE Technology and Society Magazine - December 2020 - 36
IEEE Technology and Society Magazine - December 2020 - 37
IEEE Technology and Society Magazine - December 2020 - 38
IEEE Technology and Society Magazine - December 2020 - 39
IEEE Technology and Society Magazine - December 2020 - 40
IEEE Technology and Society Magazine - December 2020 - 41
IEEE Technology and Society Magazine - December 2020 - 42
IEEE Technology and Society Magazine - December 2020 - 43
IEEE Technology and Society Magazine - December 2020 - 44
IEEE Technology and Society Magazine - December 2020 - 45
IEEE Technology and Society Magazine - December 2020 - 46
IEEE Technology and Society Magazine - December 2020 - 47
IEEE Technology and Society Magazine - December 2020 - 48
IEEE Technology and Society Magazine - December 2020 - 49
IEEE Technology and Society Magazine - December 2020 - 50
IEEE Technology and Society Magazine - December 2020 - 51
IEEE Technology and Society Magazine - December 2020 - 52
IEEE Technology and Society Magazine - December 2020 - 53
IEEE Technology and Society Magazine - December 2020 - 54
IEEE Technology and Society Magazine - December 2020 - 55
IEEE Technology and Society Magazine - December 2020 - 56
IEEE Technology and Society Magazine - December 2020 - 57
IEEE Technology and Society Magazine - December 2020 - 58
IEEE Technology and Society Magazine - December 2020 - 59
IEEE Technology and Society Magazine - December 2020 - 60
IEEE Technology and Society Magazine - December 2020 - 61
IEEE Technology and Society Magazine - December 2020 - 62
IEEE Technology and Society Magazine - December 2020 - 63
IEEE Technology and Society Magazine - December 2020 - 64
IEEE Technology and Society Magazine - December 2020 - 65
IEEE Technology and Society Magazine - December 2020 - 66
IEEE Technology and Society Magazine - December 2020 - 67
IEEE Technology and Society Magazine - December 2020 - 68
IEEE Technology and Society Magazine - December 2020 - 69
IEEE Technology and Society Magazine - December 2020 - 70
IEEE Technology and Society Magazine - December 2020 - 71
IEEE Technology and Society Magazine - December 2020 - 72
IEEE Technology and Society Magazine - December 2020 - 73
IEEE Technology and Society Magazine - December 2020 - 74
IEEE Technology and Society Magazine - December 2020 - 75
IEEE Technology and Society Magazine - December 2020 - 76
IEEE Technology and Society Magazine - December 2020 - 77
IEEE Technology and Society Magazine - December 2020 - 78
IEEE Technology and Society Magazine - December 2020 - 79
IEEE Technology and Society Magazine - December 2020 - 80
IEEE Technology and Society Magazine - December 2020 - 81
IEEE Technology and Society Magazine - December 2020 - 82
IEEE Technology and Society Magazine - December 2020 - 83
IEEE Technology and Society Magazine - December 2020 - 84
IEEE Technology and Society Magazine - December 2020 - Cover3
IEEE Technology and Society Magazine - December 2020 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com